default search action
11th AsiaCCS 2016: Xi'an, China
- Xiaofeng Chen, XiaoFeng Wang, Xinyi Huang:
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016. ACM 2016, ISBN 978-1-4503-4233-9
Keynote Address
- Shigang Liu, Jun Zhang, Yang Xiang:
Statistical Detection of Online Drifting Twitter Spam: Invited Paper. 1-10
Session 1: Software Security
- Qian Feng, Aravind Prakash, Minghua Wang, Curtis Carmony, Heng Yin:
ORIGEN: Automatic Extraction of Offset-Revealing Instructions for Cross-Version Memory Analysis. 11-22 - Hyungjoon Koo, Michalis Polychronakis:
Juggling the Gadgets: Binary-level Code Randomization using Instruction Displacement. 23-34 - Jan Werner, George Baltas, Rob Dallara, Nathan Otterness, Kevin Z. Snow, Fabian Monrose, Michalis Polychronakis:
No-Execute-After-Read: Preventing Code Disclosure in Commodity Software. 35-46 - Mariano Graziano, Davide Balzarotti, Alain Zidouemba:
ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks. 47-58
Session 2: Cloud Security I
- Heyi Tang, Yong Cui, Chaowen Guan, Jianping Wu, Jian Weng, Kui Ren:
Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control. 59-70 - Sagar Sharma, James Powers, Keke Chen:
Privacy-Preserving Spectral Analysis of Large Graphs in Public Clouds. 71-82 - Kaitai Liang, Chunhua Su, Jiageng Chen, Joseph K. Liu:
Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data. 83-94
Session 3: Cloud Security II
- Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, Xiaodong Lin:
FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System. 95-106 - Binanda Sengupta, Sushmita Ruj:
Publicly Verifiable Secure Cloud Storage for Dynamic Data Using Secure Network Coding. 107-118 - Kaoutar Elkhiyaoui, Melek Önen, Monir Azraoui, Refik Molva:
Efficient Techniques for Publicly Verifiable Delegation of Computation. 119-128
Keynote Address
- Michael Backes, Sven Bugiel, Erik Derr, Sebastian Gerling, Christian Hammer:
R-Droid: Leveraging Android App Analysis with Static Slice Optimization. 129-140
Session 4: Password Authentication and Security
- Yanjiang Yang, Haibing Lu, Joseph K. Liu, Jian Weng, Youcheng Zhang, Jianying Zhou:
Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication. 141-151 - Lin Zhang, Zhenfeng Zhang, Xuexian Hu:
UC-secure Two-Server Password-Based Authentication Protocol and Its Applications. 153-164 - Jeremiah Blocki, Anirudh Sridhar:
Client-CASH: Protecting Master Passwords against Offline Attacks. 165-176 - Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. 177-188 - Chen Wang, Xiaonan Guo, Yan Wang, Yingying Chen, Bo Liu:
Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN. 189-200
Session 5: Identity-Based Encryption
- Willy Susilo, Rongmao Chen, Fuchun Guo, Guomin Yang, Yi Mu, Yang-Wai Chow:
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext. 201-210 - Zhen Liu, Duncan S. Wong, Jack Poon:
Dealerless Corporate Key Generation for Identity-Based Encryption Schemes. 211-222 - Peng Xu, Jingnan Li, Wei Wang, Hai Jin:
Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security. 223-233 - Tao Zhang, Sherman S. M. Chow, Jinyuan Sun:
Password-Controlled Encryption with Accountable Break-Glass Access. 235-246 - Kai He, Jian Weng, Jia-Nan Liu, Joseph K. Liu, Wei Liu, Robert H. Deng:
Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security. 247-255
Session 6: Outsourcing
- Qian Wang, Jingjun Wang, Shengshan Hu, Qin Zou, Kui Ren:
SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud. 257-268 - Kai Zhang, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, Zhenfu Cao:
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation. 269-279 - Sergio Salinas, Changqing Luo, Weixian Liao, Pan Li:
Efficient Secure Outsourcing of Large-scale Quadratic Programs. 281-292 - Yanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu:
Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability. 293-303
Session 7: System Security
- Shijie Jia, Luning Xia, Bo Chen, Peng Liu:
NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer. 305-315 - Shweta Shinde, Zheng Leong Chua, Viswesh Narayanan, Prateek Saxena:
Preventing Page Faults from Telling Your Secrets. 317-328 - Ahmed Taha, Patrick Metzler, Rubén Trapero, Jesus Luna, Neeraj Suri:
Identifying and Utilizing Dependencies Across Cloud Security Services. 329-340 - Wai-Kit Sze, Abhinav Srivastava, R. Sekar:
Hardening OpenStack Cloud Platforms against Compute Node Compromises. 341-352 - Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar:
Cross Processor Cache Attacks. 353-364
Session 8: Mobile Security I
- Guozhu Meng, Yinxing Xue, Mahinthan Chandramohan, Annamalai Narayanan, Yang Liu, Jie Zhang, Tieming Chen:
Mystique: Evolving Android Malware for Auditing Anti-Malware Tools. 365-376 - Sen Chen, Minhui Xue, Zhushou Tang, Lihua Xu, Haojin Zhu:
StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware. 377-388 - Gabriele Costa, Paolo Gasti, Alessio Merlo, Shunt-Hsi Yu:
FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization. 389-400 - Eran Tromer, Roei Schuster:
DroidDisintegrator: Intra-Application Information Flow Control in Android Apps. 401-412 - Mathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo S. Cardoso, Frank Piessens:
Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms. 413-424
Session 9: IoT and CPS
- Ian D. Markwood, Yao Liu:
Vehicle Self-Surveillance: Sensor-Enabled Automatic Driver Recognition. 425-436 - Andrei Costin, Apostolis Zarras, Aurélien Francillon:
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces. 437-448 - Sridhar Adepu, Aditya Mathur:
Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant. 449-460 - Grant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, Dawn Song, David A. Wagner:
Smart Locks: Lessons for Securing Commodity Internet of Things Devices. 461-472
Keynote Address
- Giovanni Vigna:
Binary Analysis for Autonomous Hacking: Invited Abstract. 473
Session 10: Authentication
- Ding Wang, Qianchen Gu, Haibo Cheng, Ping Wang:
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes. 475-486 - Shuai Han, Shengli Liu, Fangguo Zhang, Kefei Chen:
Homomorphic Linear Authentication Schemes from (ε)-Authentication Codes. 487-498 - Neil Zhenqiang Gong, Mathias Payer, Reza Moazzezi, Mario Frank:
Forgery-Resistant Touch-based Authentication on Mobile Devices. 499-510 - Benoît Libert, Fabrice Mouhartem, Thomas Peters, Moti Yung:
Practical "Signatures with Efficient Protocols" from Simple Assumptions. 511-522 - Tao Xiang, Xiaoguo Li, Fei Chen, Yi Mu:
Bilateral-secure Signature by Key Evolving. 523-533
Session 11: Security Protocols I
- Tianhao Wang, Yunlei Zhao:
Secure Dynamic SSE via Access Indistinguishable Storage. 535-546 - Xingliang Yuan, Xinyu Wang, Cong Wang, Chen Qian, Jianxiong Lin:
Building an Encrypted, Distributed, and Searchable Key-value Store. 547-558 - Xingguang Zhou, Jianwei Liu, Weiran Liu, Qianhong Wu:
Anonymous Role-Based Access Control on E-Health Records. 559-570 - Yan Li, Ting Zhu:
Gait-Based Wi-Fi Signatures for Privacy-Preserving. 571-582 - Xingye Lu, Man Ho Au:
Anonymous Identification for Ad Hoc Group. 583-591
Session 12: Security Protocols II
- Zhe Zhou, Tao Zhang, Sherman S. M. Chow, Yupeng Zhang, Kehuan Zhang:
Efficient Authenticated Multi-Pattern Matching. 593-604 - Ngoc Hieu Tran, HweeHwa Pang, Robert H. Deng:
Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted Data. 605-616 - Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Jun-Bum Shin:
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract. 617-628 - Chong Guan, Kun Sun, Zhan Wang, Wen Tao Zhu:
Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure. 629-640 - Pierre-Alain Fouque, Chen Qian:
Fault Attacks on Efficient Pairing Implementations. 641-650
Session 13: Web and Network Security
- Ronghai Yang, Guanchen Li, Wing Cheong Lau, Kehuan Zhang, Pili Hu:
Model-based Security Testing: An Empirical Study on OAuth 2.0 Implementations. 651-662 - Issa Khalil, Ting Yu, Bei Guan:
Discovering Malicious Domains through Passive DNS Data Graph Analysis. 663-674 - Yogesh Mundada, Nick Feamster, Balachander Krishnamurthy:
Half-Baked Cookies: Hardening Cookie-Based Authentication for the Modern Web. 675-685 - Jethro G. Beekman, John L. Manferdelli, David A. Wagner:
Attestation Transparency: Building secure Internet services for legacy clients. 687-698 - Yu-Ming Ke, Chih-Wei Chen, Hsu-Chun Hsiao, Adrian Perrig, Vyas Sekar:
CICADAS: Congesting the Internet with Coordinated and Decentralized Pulsating Attacks. 699-710
Session 14: Mobile Security II
- Siqi Ma, David Lo, Teng Li, Robert H. Deng:
CDRep: Automatic Repair of Cryptographic Misuses in Android Applications. 711-722 - Marco Balduzzi, Payas Gupta, Lion Gu, Debin Gao, Mustaque Ahamad:
MobiPot: Understanding Mobile Telephony Threats with Honeycards. 723-734 - Yiming Jing, Gail-Joon Ahn, Adam Doupé, Jeong Hyun Yi:
Checking Intent-based Communication in Android with Intent Space Analysis. 735-746 - Zheran Fang, Weili Han, Dong Li, Zeqing Guo, Danhao Guo, Xiaoyang Sean Wang, Zhiyun Qian, Hao Chen:
revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps. 747-758 - Lingyun Ying, Yao Cheng, Yemian Lu, Yacong Gu, Purui Su, Dengguo Feng:
Attacks and Defence on Android Free Floating Windows. 759-770
Session 15: Malware and Attacks
- Phani Vadrevu, Roberto Perdisci:
MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis Testing. 771-782 - Babak Rahbarinia, Marco Balduzzi, Roberto Perdisci:
Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph Mining. 783-794 - Anindya Maiti, Oscar Armbruster, Murtuza Jadliwala, Jibo He:
Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms. 795-806 - Zeyi Liu, Neng Gao, Chenyang Tu, Jian Zhou, Yuan Ma, Yuan Zhao:
Leakage Fingerprints: A Non-negligible Vulnerability in Side-Channel Analysis. 807-818 - Changhai Ou, Zhu Wang, Juan Ai, Xinping Zhou, Degang Sun, Victor E. DeBrunner:
Error Tolerance based Single Interesting Point Side Channel CPA Distinguisher. 819-827
Session 16: Privacy
- Seyed Hossein Ahmadinejad, Philip W. L. Fong, Reihaneh Safavi-Naini:
Privacy and Utility of Inference Control Mechanisms for Social Computing Applications. 829-840 - Qinghan Xue, Mooi Choo Chuah, Yingying Chen:
Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS). 841-852 - Steven Van Acker, Daniel Hausknecht, Andrei Sabelfeld:
Data Exfiltration in the Face of CSP. 853-864 - Mickaël Salaün, Marion Daubignard, Hervé Debar:
StemJail: Dynamic Role Compartmentalization. 865-876 - Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper:
SkypeLine: Robust Hidden Data Transmission for VoIP. 877-888
Session 17: Short Papers
- Chuting Tan, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Jun-bin Fang, Jin Li, Yabin Jin, Jiajun Huang:
Generic Construction of Publicly Verifiable Predicate Encryption. 889-894 - Jing Li, Licheng Wang, Zonghua Zhang, Xinxin Niu:
Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family. 895-900 - Shifeng Sun, Dawu Gu, Joseph K. Liu, Udaya Parampalli, Tsz Hon Yuen:
Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption. 901-906 - Fuyang Fang, Bao Li, Xianhui Lu, Yamin Liu, Dingding Jia, Haiyang Xue:
(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus. 907-912 - Peng Xu, Jun Xu, Wei Wang, Hai Jin, Willy Susilo, Deqing Zou:
Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds. 913-918 - Johannes Götzfried, Tilo Müller, Gabor Drescher, Stefan Nürnberger, Michael Backes:
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes. 919-924 - Issa Khalil, Zuochao Dou, Abdallah Khreishah:
Your Credentials Are Compromised, Do Not Panic: You Can Be Well Protected. 925-930 - Jongho Won, Elisa Bertino:
Inside Attack Filtering for Robust Sensor Localization. 931-936
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.